logo

Cloud Computing Assignment (Doc)

15 Pages3719 Words139 Views
   

Added on  2020-03-28

Cloud Computing Assignment (Doc)

   Added on 2020-03-28

ShareRelated Documents
Runninghead:CLOUDCOMPUTING1Cloud ComputingStudent’s (Name)Institution
Cloud Computing Assignment (Doc)_1
CLOUDCOMPUTING2Introduction The content of this paper is about cloud computing and its benefits and to organizationcurrently adopting to cloud computing. Cloud computing is a type of information technologyparadigm or a model which enables ubiquitous access to various shared pools of configurableitems within an organization. It gives access to resources such as computer servers, computernetworks, applications, storage and services. The main issues behind this report is to provideaccurate information to the board members of Webb’s an organization which is currentlymigrating to the use of cloud computing for daily operations. Webb’s as an organization requiresa cloud computing system and is determined to adoption of a hybrid cloud methodology. Theorganization is also concerned with the benefits, risks related to cloud data backup, managementand issues. The company has settled on the use of cloud computing system in order to reduce thecosts of LTO 6 tapes used for back up critical missions. The organization is also determined toreduce the cost of off-site storage the tapes and also interested in the fast backup of databasethrough the cloud computing. The content of this paper therefore provides information to theboard of Webb’s on the types of security that should deployed to protect the migration missionfrom the MS SQL Server 2012 R2 database to an IaaS instance in a public cloud. The content ofthis report ends with a well outlined recommendation on how the board of members of Webb’son how they can fully secure and protect the newly cloud computing. Question 1
Cloud Computing Assignment (Doc)_2
CLOUDCOMPUTING3(A)Type of security to be deployed to protect the migration of data from MS SQLServer 2012 R2 database to an IaaS instance in a public cloudAs Webb’ is planning on moving workloads to Infrastructure as a service (IaaS), theorganization should consider various security measures as the mission always results to variousthreats to a system. During such missions data is always susceptible to threats which mustcontained through deployment of various security measures. When data is being moved from onedatabase to another, the company of an organization such as Webb’s in most of the occasionshave their data shared with the service provider and this may be competitive risk to theorganization as this may lead to leakage of key consumer information to the rival firm (Furht &Escalante, 2010). The management of the organization should therefore consider application ofexpertise in securing the virtual environments as well as utilizing new options to secure themission.Application of privileged access workstationsDuring such missions Webb’s is likely to fall a prey to cyber attackers who are always readyduring such missions as a result of various organizational administrators’ performance of actionwhile using their accounts which have elevated rights. During the mission critical use ofresources such as emails and internet browsing can be hazardous even though these applicationsseems innocent enough (Antonopoulos & Gillam, 2017). During the mission use of emails andbrowsers may expose the elevated accounts to a state of compromise by various malicious actors.The board should therefore ensure the application of privileged access workstations to reduce thesusceptibility of the system during the mission to cyber-attacks as well as malicious actors.
Cloud Computing Assignment (Doc)_3
CLOUDCOMPUTING4Data encryption and use of multi-factor authenticationIn order to secure data during the migration, the management board should consider dataencryption and application of multi- factor authentication. When migrating from one system ofdatabase to another both the new system and the previous system must be secure. Webb’s shouldtherefore apply the above security measure during the mission critical and this security methodshould be simple and comply with the exceptional demands of their demands on privacy as wellas secure the whole system (Buyya, Broberg & Gościński, 2011). Encryption of data duringtransmission applied together with an operational multi-factor authentication as well asauthorizations tools should provide security to the mission. Provider verification Webb’s management board should also verify the provider who is contracted to help with themigration mission. The board should read the cloud contracted provider’s service levelagreement and check how the provider is prepared to secure the whole system during themission. They should also check to see the provider’s rate of transparency and apply variouslegal issues to ensure that the whole proses is secure. The board and the cloud provider should beaware of their responsibilities during the whole process, this will enable the appropriate action tobe taken by each party.(b) Benefits and issues that would be as the result of the deployment of abovesecurity measuresThe implementations of the above security measures during the mission critical comeswith a lot of benefits and issues to an organization going through the process. The first issues is
Cloud Computing Assignment (Doc)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Hybrid Cloud Approach | Report
|13
|2689
|73

Virtualization and Cloud Computing Assignment
|18
|4072
|95

Risk and Security in Cloud Computing | Report
|17
|4058
|59

Case Study of Webbs Stores - ITC568
|11
|4098
|73

Cloud Computing Assignment No.: Webb's Store
|12
|2648
|105

Cloud Computing in Amazon | Assignment
|15
|2948
|171